| 2024 | "False negative - that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing. Amit Seal Ami, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni |
| 2024 | "Len or index or count, anything but v1": Predicting Variable Names in Decompilation Output with Transfer Learning. Kuntal Kumar Pal, Ati Priya Bajaj, Pratyay Banerjee, Audrey Dutcher, Mutsumi Nakamura, Zion Leonahenahe Basque, Himanshu Gupta, Saurabh Arjun Sawant, Ujjwala Anantheswaran, Yan Shoshitaishvili, Adam Doupé, Chitta Baral, Ruoyu Wang |
| 2024 | "Watching over the shoulder of a professional": Why Hackers Make Mistakes and How They Fix Them. Irina Ford, Ananta Soneji, Faris Bugra Kokulu, Jayakrishna Vadayath, Zion Leonahenahe Basque, Gaurav Vipat, Adam Doupé, Ruoyu Wang, Gail-Joon Ahn, Tiffany Bao, Yan Shoshitaishvili |
| 2024 | A Picture is Worth 500 Labels: A Case Study of Demographic Disparities in Local Machine Learning Models for Instagram and TikTok. Jack West, Lea Thiemt, Shimaa Ahmed, Maggie Bartig, Kassem Fawaz, Suman Banerjee |
| 2024 | A Representative Study on Human Detection of Artificially Generated Media Across Countries. Joel Frank, Franziska Herbert, Jonas Ricker, Lea Schönherr, Thorsten Eisenhofer, Asja Fischer, Markus Dürmuth, Thorsten Holz |
| 2024 | A Security Analysis of Honey Vaults. Fei Duan, Ding Wang, Chunfu Jia |
| 2024 | A Systematic Study of Physical Sensor Attack Hardness. Hyungsub Kim, Rwitam Bandyopadhyay, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Yongdae Kim, Dongyan Xu |
| 2024 | A Tale of Two Industroyers: It was the Season of Darkness. Luis E. Salazar, Sebastián R. Castro, Juan Lozano, Keerthi Koneru, Emmanuele Zambon, Bing Huang, Ross Baldick, Marina Krotofil, Alonso Rojas, Alvaro A. Cárdenas |
| 2024 | AFGen: Whole-Function Fuzzing for Applications and Libraries. Yuwei Liu, Yanhao Wang, Xiangkun Jia, Zheng Zhang, Purui Su |
| 2024 | ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features. Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren |
| 2024 | APP-Miner: Detecting API Misuses via Automatically Mining API Path Patterns. Jiasheng Jiang, Jingzheng Wu, Xiang Ling, Tianyue Luo, Sheng Qu, Yanjun Wu |
| 2024 | ARMOR: A Formally Verified Implementation of X.509 Certificate Chain Validation. Joyanta Debnath, Christa Jenkins, Yuteng Sun, Sze Yiu Chau, Omar Chowdhury |
| 2024 | AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection. Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao |
| 2024 | AirTaint: Making Dynamic Taint Analysis Faster and Easier. Qian Sang, Yanhao Wang, Yuwei Liu, Xiangkun Jia, Tiffany Bao, Purui Su |
| 2024 | An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape. Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath |
| 2024 | AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management. Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin R. B. Butler, Md Jahidul Islam, Sara Rampazzi |
| 2024 | Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs. Hans Winderix, Marton Bognar, Job Noorman, Lesly-Ann Daniel, Frank Piessens |
| 2024 | Asterisk: Super-fast MPC with a Friend. Banashri Karmakar, Nishat Koti, Arpita Patra, Sikhar Patranabis, Protik Paul, Divya Ravi |
| 2024 | Attacking Byzantine Robust Aggregation in High Dimensions. Sarthak Choudhary, Aashish Kolluri, Prateek Saxena |
| 2024 | Attacking and Improving the Tor Directory Protocol. Zhongtang Luo, Adithya Bhat, Kartik Nayak, Aniket Kate |
| 2024 | Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call Specialization. William Blair, Frederico Araujo, Teryl Taylor, Jiyong Jang |
| 2024 | BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting. Huming Qiu, Junjie Sun, Mi Zhang, Xudong Pan, Min Yang |
| 2024 | BOLT: Privacy-Preserving, Accurate and Efficient Inference for Transformers. Qi Pang, Jinhao Zhu, Helen Möllering, Wenting Zheng, Thomas Schneider |
| 2024 | BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect. Cristiano Rodrigues, Daniel Oliveira, Sandro Pinto |
| 2024 | Backdooring Multimodal Learning. Xingshuo Han, Yutong Wu, Qingjie Zhang, Yuan Zhou, Yuan Xu, Han Qiu, Guowen Xu, Tianwei Zhang |
| 2024 | BadVFL: Backdoor Attacks in Vertical Federated Learning. Mohammad Naseri, Yufei Han, Emiliano De Cristofaro |
| 2024 | Baffle: Hiding Backdoors in Offline Reinforcement Learning Datasets. Chen Gong, Zhou Yang, Yunpeng Bai, Junda He, Jieke Shi, Kecen Li, Arunesh Sinha, Bowen Xu, Xinwen Hou, David Lo, Tianhao Wang |
| 2024 | Benzene: A Practical Root Cause Analysis System with an Under-Constrained State Mutation. Younggi Park, Hwiwon Lee, Jinho Jung, Hyungjoon Koo, Huy Kang Kim |
| 2024 | BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wild. Jie Wan, Jianhao Fu, Lijin Wang, Ziqi Yang |
| 2024 | Bounded and Unbiased Composite Differential Privacy. Kai Zhang, Yanjun Zhang, Ruoxi Sun, Pei-Wei Tsai, Muneeb Ul Hassan, Xin Yuan, Minhui Xue, Jinjun Chen |
| 2024 | Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services. Dario Pasquini, Danilo Francati, Giuseppe Ateniese, Evgenios M. Kornaropoulos |
| 2024 | Break the Wall from Bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls. Qi Wang, Jianjun Chen, Zheyu Jiang, Run Guo, Ximeng Liu, Chao Zhang, Haixin Duan |
| 2024 | Budget Recycling Differential Privacy. Bo Jiang, Jian Du, Sagar Sharma, Qiang Yan |
| 2024 | Bulkor: Enabling Bulk Loading for Path ORAM. Xiang Li, Yunqian Luo, Mingyu Gao |
| 2024 | C-Frame: Characterizing and measuring in-the-wild CAPTCHA attacks. Hoang Dai Nguyen, Karthika Subramani, Bhupendra Acharya, Roberto Perdisci, Phani Vadrevu |
| 2024 | CORELOCKER: Neuron-level Usage Control. Zihan Wang, Zhongkui Ma, Xinguo Feng, Ruoxi Sun, Hu Wang, Minhui Xue, Guangdong Bai |
| 2024 | CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers. Matan Ben-Tov, Daniel Deutch, Nave Frost, Mahmood Sharif |
| 2024 | Can we cast a ballot as intended and be receipt free? Henri Devillez, Olivier Pereira, Thomas Peters, Quentin Yang |
| 2024 | Casual Users and Rational Choices within Differential Privacy. Narges Ashena, Oana Inel, Badrie L. Persaud, Abraham Bernstein |
| 2024 | Cerberus: Enabling Efficient and Effective In-Network Monitoring on Programmable Switches. Huancheng Zhou, Guofei Gu |
| 2024 | Certifying Zero-Knowledge Circuits with Refinement Types. Junrui Liu, Ian Kretz, Hanzhi Liu, Bryan Tan, Jonathan Wang, Yi Sun, Luke Pearson, Anders Miltner, Isil Dillig, Yu Feng |
| 2024 | Children, Parents, and Misinformation on Social Media. Filipo Sharevski, Jennifer Vander Loop |
| 2024 | Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delay. Yuanliang Chen, Fuchen Ma, Yuanhang Zhou, Ming Gu, Qing Liao, Yu Jiang |
| 2024 | Cohere: Managing Differential Privacy in Large Scale Systems. Nicolas Küchler, Emanuel Opel, Hidde Lycklama, Alexander Viand, Anwar Hithnawi |
| 2024 | Combing for Credentials: Active Pattern Extraction from Smart Reply. Bargav Jayaraman, Esha Ghosh, Melissa Chase, Sambuddha Roy, Wei Dai, David Evans |
| 2024 | Communication-efficient, Fault Tolerant PIR over Erasure Coded Storage. Andrew Park, Trevor Leong, Francisco Maturana, Wenting Zheng, K. V. Rashmi |
| 2024 | ConjunCT: Learning Inductive Invariants to Prove Unbounded Instruction Safety Against Microarchitectural Timing Attacks. Sushant Dinesh, Madhusudan Parthasarathy, Christopher W. Fletcher |
| 2024 | Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams. Bhupendra Acharya, Muhammad Saad, Antonio Emanuele Cinà, Lea Schönherr, Hoang Dai Nguyen, Adam Oest, Phani Vadrevu, Thorsten Holz |
| 2024 | CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model. Simon Jeanteur, Laura Kovács, Matteo Maffei, Michael Rawson |
| 2024 | DNSBomb: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses. Xiang Li, Dashuai Wu, Haixin Duan, Qi Li |
| 2024 | DP-Auditorium: A Large-Scale Library for Auditing Differential Privacy. William Kong, Andrés Muñoz Medina, Mónica Ribero, Umar Syed |
| 2024 | DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming. Shuya Feng, Meisam Mohammady, Han Wang, Xiaochen Li, Zhan Qin, Yuan Hong |
| 2024 | DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing. Max Ammann, Lucca Hirschi, Steve Kremer |
| 2024 | DeepShuffle: A Lightweight Defense Framework against Adversarial Fault Injection Attacks on Deep Neural Networks in Multi-Tenant Cloud-FPGA. Yukui Luo, Adnan Siraj Rakin, Deliang Fan, Xiaolin Xu |
| 2024 | DeepTheft: Stealing DNN Model Architectures through Power Side Channel. Yansong Gao, Huming Qiu, Zhi Zhang, Binghui Wang, Hua Ma, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Surya Nepal |
| 2024 | DeepVenom: Persistent DNN Backdoors Exploiting Transient Weight Perturbations in Memories. Kunbei Cai, Md Hafizul Islam Chowdhuryy, Zhenkai Zhang, Fan Yao |
| 2024 | Device-Oriented Group Messaging: A Formal Cryptographic Analysis of Matrix' Core. Martin R. Albrecht, Benjamin Dowling, Daniel Jones |
| 2024 | Digital Security - A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups. Franziska Herbert, Steffen Becker, Annalina Buckmann, Marvin Kowalewski, Jonas Hielscher, Yasemin Acar, Markus Dürmuth, Yixin Zou, M. Angela Sasse |
| 2024 | Distributed & Scalable Oblivious Sorting and Shuffling. Nicholas Ngai, Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos |
| 2024 | Distribution Preserving Backdoor Attack in Self-supervised Learning. Guanhong Tao, Zhenting Wang, Shiwei Feng, Guangyu Shen, Shiqing Ma, Xiangyu Zhang |
| 2024 | Do You Play It by the Books? A Study on Incident Response Playbooks and Influencing Factors. Daniel Schlette, Philip Empl, Marco Caselli, Thomas Schreck, Günther Pernul |
| 2024 | Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater. Andreas Brüggemann, Oliver Schick, Thomas Schneider, Ajith Suresh, Hossein Yalame |
| 2024 | Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users. David Koisser, Richard Mitev, Marco Chilese, Ahmad-Reza Sadeghi |
| 2024 | DrSec: Flexible Distributed Representations for Efficient Endpoint Security. Mahmood Sharif, Pubali Datta, Andy Riddle, Kim Westfall, Adam Bates, Vijay Ganti, Matthew Lentz, David Ott |
| 2024 | Dropout Attacks. Andrew Yuan, Alina Oprea, Cheng Tan |
| 2024 | E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting. Louis-Henri Merino, Alaleh Azhir, Haoqian Zhang, Simone Colombo, Bernhard Tellenbach, Vero Estrada-Galiñanes, Bryan Ford |
| 2024 | ERASan: Efficient Rust Address Sanitizer. Jiun Min, Dongyeon Yu, Seongyun Jeong, Dokyung Song, Yuseok Jeon |
| 2024 | Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage. Wenhao Zhang, Xiaojie Guo, Kang Yang, Ruiyu Zhu, Yu Yu, Xiao Wang |
| 2024 | Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction. Bofei Chen, Lei Zhang, Xinyou Huang, Yinzhi Cao, Keke Lian, Yuan Zhang, Min Yang |
| 2024 | Efficient Zero-Knowledge Arguments For Paillier Cryptosystem. Borui Gong, Wang Fat Lau, Man Ho Au, Rupeng Yang, Haiyang Xue, Lichun Li |
| 2024 | Efficient and Generic Microarchitectural Hash-Function Recovery. Lukas Gerlach, Simon Schwarz, Nicolas Faroß, Michael Schwarz |
| 2024 | Enforcing End-to-end Security for Remote Conference Applications. Yuelin Liu, Huangxun Chen, Zhice Yang |
| 2024 | Eureka: A General Framework for Black-box Differential Privacy Estimators. Yun Lu, Malik Magdon-Ismail, Yu Wei, Vassilis Zikas |
| 2024 | Everyone for Themselves? A Qualitative Study about Individual Security Setups of Open Source Software Contributors. Sabrina Amft, Sandra Höltervennhoff, Rebecca Panskus, Karola Marky, Sascha Fahl |
| 2024 | Everything is Good for Something: Counterexample-Guided Directed Fuzzing via Likely Invariant Inference. Heqing Huang, Anshunkang Zhou, Mathias Payer, Charles Zhang |
| 2024 | Exploring the Orthogonality and Linearity of Backdoor Attacks. Kaiyuan Zhang, Siyuan Cheng, Guangyu Shen, Guanhong Tao, Shengwei An, Anuran Makur, Shiqing Ma, Xiangyu Zhang |
| 2024 | FCert: Certifiably Robust Few-Shot Classification in the Era of Foundation Models. Yanting Wang, Wei Zou, Jinyuan Jia |
| 2024 | FLShield: A Validation Based Federated Learning Framework to Defend Against Poisoning Attacks. Ehsanul Kabir, Zeyu Song, Md. Rafi Ur Rashid, Shagufta Mehnaz |
| 2024 | Few-shot Unlearning. Youngsik Yoon, Jinhwan Nam, Hyojeong Yun, Jaeho Lee, Dongwoo Kim, Jungseul Ok |
| 2024 | Flash: A Comprehensive Approach to Intrusion Detection via Provenance Graph Representation Learning. Mati Ur Rehman, Hadi Ahmadi, Wajih Ul Hassan |
| 2024 | FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge. Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino |
| 2024 | Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers. Ankit Kumar, Max von Hippel, Panagiotis Manolios, Cristina Nita-Rotaru |
| 2024 | From Chatbots to Phishbots?: Phishing Scam Generation in Commercial Large Language Models. Sayak Saha Roy, Poojitha Thota, Krishna Vamsi Naragam, Shirin Nilizadeh |
| 2024 | From Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuning. Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu |
| 2024 | From Principle to Practice: Vertical Data Minimization for Machine Learning. Robin Staab, Nikola Jovanovic, Mislav Balunovic, Martin T. Vechev |
| 2024 | From Virtual Touch to Tesla Command: Unlocking Unauthenticated Control Chains From Smart Glasses for Vehicle Takeover. Xingli Zhang, Yazhou Tu, Yan Long, Liqun Shan, Mohamed A Elsaadani, Kevin Fu, Zhiqiang Lin, Xiali Hei |
| 2024 | GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols. Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song |
| 2024 | GPU.zip: On the Side-Channel Implications of Hardware-Based Graphical Data Compression. Yingchen Wang, Riccardo Paccagnella, Zhao Gang, Willy R. Vasquez, David Kohlbrenner, Hovav Shacham, Christopher W. Fletcher |
| 2024 | GrOVe: Ownership Verification of Graph Neural Networks using Embeddings. Asim Waheed, Vasisht Duddu, N. Asokan |
| 2024 | Group Oblivious Message Retrieval. Zeyu Liu, Eran Tromer, Yunhao Wang |
| 2024 | Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Information. Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu |
| 2024 | Holepunch: Fast, Secure File Deletion with Crash Consistency. Zachary Ratliff, Wittmann Goh, Abe Wieland, James Mickens, Ryan Williams |
| 2024 | Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis. Penghui Li, Wei Meng, Mingxue Zhang, Chenlin Wang, Changhua Luo |
| 2024 | Hyena: Balancing Packing, Reuse, and Rotations for Encrypted Inference. Sarabjeet Singh, Shreyas Singh, Sumanth Gudaparthi, Xiong Fan, Rajeev Balasubramonian |
| 2024 | IEEE Symposium on Security and Privacy, SP 2024, San Francisco, CA, USA, May 19-23, 2024 |
| 2024 | INVISILINE: Invisible Plausibly-Deniable Storage. Sandeep Kiran Pinjala, Bogdan Carbunar, Anrin Chakraborti, Radu Sion |
| 2024 | Injection Attacks Against End-to-End Encrypted Applications. Andrés Fábrega, Carolina Ortega Pérez, Armin Namavari, Ben Nassi, Rachit Agarwal, Thomas Ristenpart |
| 2024 | Investigating Voter Perceptions of Printed Physical Audit Trails for Online Voting. Karola Marky, Nina Gerber, Henry John Krumb, Mohamed Khamis, Max Mühlhäuser |
| 2024 | It's Simplex! Disaggregating Measures to Improve Certified Robustness. Andrew C. Cullen, Paul Montague, Shijie Liu, Sarah M. Erfani, Benjamin I. P. Rubinstein |
| 2024 | Janus: Safe Biometric Deduplication for Humanitarian Aid Distribution. Kasra Edalatnejad, Wouter Lueks, Justinas Sukaitis, Vincent Graf Narbel, Massimo Marelli, Carmela Troncoso |
| 2024 | Jasmine: Scale up JavaScript Static Security Analysis with Computation-based Semantic Explanation. Feng Xiao, Zhongfu Su, Guangliang Yang, Wenke Lee |
| 2024 | Jbeil: Temporal Graph-Based Inductive Learning to Infer Lateral Movement in Evolving Enterprise Networks. Joseph Khoury, Dorde Klisura, Hadi Zanddizari, Gonzalo De La Torre Parra, Peyman Najafirad, Elias Bou-Harb |
| 2024 | Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance. Zijun Cheng, Qiujian Lv, Jinyuan Liang, Yan Wang, Degang Sun, Thomas Pasquier, Xueyuan Han |
| 2024 | LACMUS: Latent Concept Masking for General Robustness Enhancement of DNNs. Shuo Wang, Hongsheng Hu, Jiamin Chang, Benjamin Zi Hao Zhao, Minhui Xue |
| 2024 | LLMIF: Augmented Large Language Model for Fuzzing IoT Devices. Jincheng Wang, Le Yu, Xiapu Luo |
| 2024 | LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks. Saad Ullah, Mingji Han, Saurabh Pujar, Hammond Pearce, Ayse K. Coskun, Gianluca Stringhini |
| 2024 | Labrador: Response Guided Directed Fuzzing for Black-box IoT Devices. Hangtian Liu, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Xiangzhi Wang, Guangming Gao |
| 2024 | Large-Scale Study of Vulnerability Scanners for Ethereum Smart Contracts. Christoph Sendner, Lukas Petzi, Jasper Stang, Alexandra Dmitrienko |
| 2024 | Larger-scale Nakamoto-style Blockchains Don't Necessarily Offer Better Security. Jannik Albrecht, Sébastien Andreina, Frederik Armknecht, Ghassan Karame, Giorgia Azzurra Marson, Julian Willingmann |
| 2024 | Leaky Address Masking: Exploiting Unmasked Spectre Gadgets with Noncanonical Address Translation. Mathé Hertogh, Sander Wiebing, Cristiano Giuffrida |
| 2024 | Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning. Hongsheng Hu, Shuo Wang, Tian Dong, Minhui Xue |
| 2024 | Leveraging Prefix Structure to Detect Volumetric DDoS Attack Signatures with Programmable Switches. Chris Misa, Ramakrishnan Durairajan, Arpit Gupta, Reza Rejaie, Walter Willinger |
| 2024 | Ligetron: Lightweight Scalable End-to-End Zero-Knowledge Proofs Post-Quantum ZK-SNARKs on a Browser. Ruihan Wang, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam |
| 2024 | Loki: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation. Joshua C. Zhao, Atul Sharma, Ahmed Roushdy Elkordy, Yahya H. Ezzeldin, Salman Avestimehr, Saurabh Bagchi |
| 2024 | Lower Bounds for Rényi Differential Privacy in a Black-Box Setting. Tim Kutta, Önder Askin, Martin Dunsche |
| 2024 | MAWSEO: Adversarial Wiki Search Poisoning for Illicit Online Promotion. Zilong Lin, Zhengyi Li, Xiaojing Liao, Xiaofeng Wang, Xiaozhong Liu |
| 2024 | MEA-Defender: A Robust Watermark against Model Extraction Attack. Peizhuo Lv, Hualong Ma, Kai Chen, Jiachen Zhou, Shengzhi Zhang, Ruigang Liang, Shenchen Zhu, Pan Li, Yingjun Zhang |
| 2024 | MIMOCrypt: Multi-User Privacy-Preserving Wi-Fi Sensing via MIMO Encryption. Jun Luo, Hangcheng Cao, Hongbo Jiang, Yanbing Yang, Zhe Chen |
| 2024 | MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic. Hang Wang, Zhen Xiang, David J. Miller, George Kesidis |
| 2024 | MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography. Weihao Bai, Long Chen, Qianwen Gao, Zhenfeng Zhang |
| 2024 | MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations. Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing |
| 2024 | Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption. Xiaoguo Li, Guomin Yang, Tao Xiang, Shengmin Xu, Bowen Zhao, HweeHwa Pang, Robert H. Deng |
| 2024 | Measure-Observe-Remeasure: An Interactive Paradigm for Differentially-Private Exploratory Analysis. Priyanka Nanayakkara, Hyeok Kim, Yifan Wu, Ali Sarvghad, Narges Mahyar, Gerome Miklau, Jessica Hullman |
| 2024 | Measuring the Effects of Stack Overflow Code Snippet Evolution on Open-Source Software Security. Alfusainey Jallow, Michael Schilling, Michael Backes, Sven Bugiel |
| 2024 | MetaFly: Wireless Backhaul Interception via Aerial Wavefront Manipulation. Zhambyl Shaikhanov, Sherif Badran, Hichem Guerboukha, Josep Miquel Jornet, Daniel M. Mittleman, Edward W. Knightly |
| 2024 | Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models. Nishant Vishwamitra, Keyan Guo, Farhan Tajwar Romit, Isabelle Ondracek, Long Cheng, Ziming Zhao, Hongxin Hu |
| 2024 | More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Services. Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu, Haixin Duan, Xing Gao |
| 2024 | More is Merrier: Relax the Non-Collusion Assumption in Multi-Server PIR. Tiantian Gong, Ryan Henry, Alexandros Psomas, Aniket Kate |
| 2024 | Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection. Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan, Yao Ma |
| 2024 | Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements. Cas Cremers, Eyal Ronen, Mang Zhao |
| 2024 | NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator. Jianshuo Liu, Hong Li, Mengjie Sun, Haining Wang, Hui Wen, Zhi Li, Limin Sun |
| 2024 | Nebula: A Privacy-First Platform for Data Backhaul. Jean-Luc Watson, Tess Despres, Alvin Tan, Shishir G. Patil, Prabal Dutta, Raluca Ada Popa |
| 2024 | Need for Speed: Taming Backdoor Attacks with Speed and Precision. Zhuo Ma, Yilong Yang, Yang Liu, Tong Yang, Xinjing Liu, Teng Li, Zhan Qin |
| 2024 | NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge. Patrick Tser Jern Kon, Aniket Gattani, Dhiraj Saharia, Tianyu Cao, Diogo Barradas, Ang Chen, Micah Sherr, Benjamin E. Ujcich |
| 2024 | Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models. Shawn Shan, Wenxin Ding, Josephine Passananti, Stanley Wu, Haitao Zheng, Ben Y. Zhao |
| 2024 | No Easy Way Out: the Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment. Anh V. Vu, Alice Hutchings, Ross J. Anderson |
| 2024 | No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device ML. Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, Xiangqun Chen |
| 2024 | Node-aware Bi-smoothing: Certified Robustness against Graph Injection Attacks. Yuni Lai, Yulin Zhu, Bailin Pan, Kai Zhou |
| 2024 | Non-Atomic Arbitrage in Decentralized Finance. Lioba Heimbach, Vabuk Pahari, Eric Schertenleib |
| 2024 | Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation. Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu |
| 2024 | Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts. Wuqi Zhang, Zhuo Zhang, Qingkai Shi, Lu Liu, Lili Wei, Yepang Liu, Xiangyu Zhang, Shing-Chi Cheung |
| 2024 | Obelix: Mitigating Side-Channels Through Dynamic Obfuscation. Jan Wichelmann, Anja Rabich, Anna Pätschke, Thomas Eisenbarth |
| 2024 | OdScan: Backdoor Scanning for Object Detection Models. Siyuan Cheng, Guangyu Shen, Guanhong Tao, Kaiyuan Zhang, Zhuo Zhang, Shengwei An, Xiangzhe Xu, Yingqi Li, Shiqing Ma, Xiangyu Zhang |
| 2024 | On (the Lack of) Code Confidentiality in Trusted Execution Environments. Ivan Puddu, Moritz Schneider, Daniele Lain, Stefano Boschetto, Srdjan Capkun |
| 2024 | On Large Language Models' Resilience to Coercive Interrogation. Zhuo Zhang, Guangyu Shen, Guanhong Tao, Siyuan Cheng, Xiangyu Zhang |
| 2024 | On SMS Phishing Tactics and Infrastructure. Aleksandr Nahapetyan, Sathvik Prasad, Kevin Childs, Adam Oest, Yeganeh Ladwig, Alexandros Kapravelos, Bradley Reaves |
| 2024 | One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices. Marco Chilese, Richard Mitev, Meni Orenbach, Robert Thorburn, Ahmad Atamli, Ahmad-Reza Sadeghi |
| 2024 | Optimal Flexible Consensus and its Application to Ethereum. Joachim Neu, Srivatsan Sridhar, Lei Yang, David Tse |
| 2024 | Orca: FSS-based Secure Training and Inference with GPUs. Neha Jawalkar, Kanav Gupta, Arkaprava Basu, Nishanth Chandran, Divya Gupta, Rahul Sharma |
| 2024 | P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF. Osama Bajaber, Bo Ji, Peng Gao |
| 2024 | PIRANA: Faster Multi-query PIR via Constant-weight Codes. Jian Liu, Jingyu Li, Di Wu, Kui Ren |
| 2024 | POMABuster: Detecting Price Oracle Manipulation Attacks in Decentralized Finance. Rui Xi, Zehua Wang, Karthik Pattabiraman |
| 2024 | Pandora: Principled Symbolic Validation of Intel SGX Enclave Runtimes. Fritz Alder, Lesly-Ann Daniel, David F. Oswald, Frank Piessens, Jo Van Bulck |
| 2024 | Parse Me, Baby, One More Time: Bypassing HTML Sanitizer via Parsing Differentials. David Klein, Martin Johns |
| 2024 | PassREfinder: Credential Stuffing Risk Prediction by Representing Password Reuse between Websites on a Graph. Jaehan Kim, Minkyoo Song, Minjae Seo, Youngjin Jin, Seungwon Shin |
| 2024 | Patchy Performance? Uncovering the Vulnerability Management Practices of IoT-Centric Vendors. Sandra Rivera Pérez, Michel van Eeten, Carlos Hernandez Gañán |
| 2024 | Pianist: Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs. Tianyi Liu, Tiancheng Xie, Jiaheng Zhang, Dawn Song, Yupeng Zhang |
| 2024 | Piano: Extremely Simple, Single-Server PIR with Sublinear Server Computation. Mingxun Zhou, Andrew Park, Wenting Zheng, Elaine Shi |
| 2024 | Please Tell Me More: Privacy Impact of Explainability through the Lens of Membership Inference Attack. Han Liu, Yuhao Wu, Zhiyuan Yu, Ning Zhang |
| 2024 | Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models. Sanghak Oh, Kiho Lee, Seonhye Park, Doowon Kim, Hyoungshick Kim |
| 2024 | Poisoning Web-Scale Training Datasets is Practical. Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum S. Anderson, Andreas Terzis, Kurt Thomas, Florian Tramèr |
| 2024 | PolySphinx: Extending the Sphinx Mix Format With Better Multicast Support. Daniel Schadt, Christoph Coijanovic, Christiane Weis, Thorsten Strufe |
| 2024 | Practical Attacks Against DNS Reputation Systems. Tillson Galloway, Kleanthis Karakolios, Zane Ma, Roberto Perdisci, Angelos D. Keromytis, Manos Antonakakis |
| 2024 | Practical Obfuscation of BLE Physical-Layer Fingerprints on Mobile Devices. Hadi Givehchian, Nishant Bhaskar, Alexander Redding, Han Zhao, Aaron Schulman, Dinesh Bharadia |
| 2024 | Predecessor-aware Directed Greybox Fuzzing. Yujian Zhang, Yaokun Liu, Jinyu Xu, Yanhao Wang |
| 2024 | Preserving Node-level Privacy in Graph Neural Networks. Zihang Xiang, Tianhao Wang, Di Wang |
| 2024 | PriDe CT: Towards Public Consensus, Private Transactions, and Forward Secrecy in Decentralized Payments. Yue Guo, Harish Karthikeyan, Antigoni Polychroniadou, Chaddy Huussin |
| 2024 | Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs. Mayank Rathee, Yuwen Zhang, Henry Corrigan-Gibbs, Raluca Ada Popa |
| 2024 | Private Hierarchical Governance for Encrypted Messaging. Armin Namavari, Barry Wang, Sanketh Menda, Ben Nassi, Nirvan Tyagi, James Grimmelmann, Amy X. Zhang, Thomas Ristenpart |
| 2024 | PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification. Hongwei Yao, Jian Lou, Zhan Qin, Kui Ren |
| 2024 | Protecting Label Distribution in Cross-Silo Federated Learning. Yangfan Jiang, Xinjian Luo, Yuncheng Wu, Xiaokui Xiao, Beng Chin Ooi |
| 2024 | Prune+PlumTree - Finding Eviction Sets at Scale. Tom Kessous, Niv Gilboa |
| 2024 | Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments. Soo-Jin Moon, Milind Srivastava, Yves Bieri, Ruben Martins, Vyas Sekar |
| 2024 | Pudding: Private User Discovery in Anonymity Networks. Ceren Kocaogullar, Daniel Hugenroth, Martin Kleppmann, Alastair R. Beresford |
| 2024 | Pulling Off The Mask: Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fraud. Mingxuan Yao, Runze Zhang, Haichuan Xu, Shih-Huan Chou, Varun Chowdhary Paturi, Amit Kumar Sikder, Brendan Saltaformaggio |
| 2024 | R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection. Akul Goyal, Gang Wang, Adam Bates |
| 2024 | Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization. Meng Shen, Kexin Ji, Jinhe Wu, Qi Li, Xiangdong Kong, Ke Xu, Liehuang Zhu |
| 2024 | Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelity. Xinming Wei, Jiaxi Zhang, Guojie Luo |
| 2024 | Revisiting Automotive Attack Surfaces: a Practitioners' Perspective. Pengfei Jing, Zhiqiang Cai, Yingjie Cao, Le Yu, Yuefeng Du, Wenkai Zhang, Chenxiong Qian, Xiapu Luo, Sen Nie, Shi Wu |
| 2024 | Revisiting Black-box Ownership Verification for Graph Neural Networks. Ruikai Zhou, Kang Yang, Xiuling Wang, Wendy Hui Wang, Jun Xu |
| 2024 | Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics. Xiaoxing Mo, Yechao Zhang, Leo Yu Zhang, Wei Luo, Nan Sun, Shengshan Hu, Shang Gao, Yang Xiang |
| 2024 | Routing Attacks on Cryptocurrency Mining Pools. Muoi Tran, Theo von Arx, Laurent Vanbever |
| 2024 | SHERPA: Explainable Robust Algorithms for Privacy-Preserved Federated Learning in Future Networks to Defend Against Data Poisoning Attacks. Chamara Sandeepa, Bartlomiej Siniarski, Shen Wang, Madhusanka Liyanage |
| 2024 | SINBAD: Saliency-informed detection of breakage caused by ad blocking. Saiid El Hajj Chehade, Sandra Deepthy Siby, Carmela Troncoso |
| 2024 | Sabre: Cutting through Adversarial Noise with Adaptive Spectral Filtering and Input Reconstruction. Alec F. Diallo, Paul Patras |
| 2024 | Saturn: Host-Gadget Synergistic USB Driver Fuzzing. Yiru Xu, Hao Sun, Jianzhong Liu, Yuheng Shen, Yu Jiang |
| 2024 | Scalable Mixed-Mode MPC. Radhika Garg, Kang Yang, Jonathan Katz, Xiao Wang |
| 2024 | Scalable Verification of Zero-Knowledge Protocols. Miguel Isabel, Clara Rodríguez-Núñez, Albert Rubio |
| 2024 | Scores Tell Everything about Bob: Non-adaptive Face Reconstruction on Face Recognition Systems. Sunpill Kim, Yong Kiam Tan, Bora Jeong, Soumik Mondal, Khin Mi Mi Aung, Jae Hong Seo |
| 2024 | Secure Messaging with Strong Compromise Resilience, Temporal Privacy, and Immediate Decryption. Cas Cremers, Mang Zhao |
| 2024 | Secure Ranging with IEEE 802.15.4z HRP UWB. Xiliang Luo, Cem Kalkanli, Hao Zhou, Pengcheng Zhan, Moche Cohen |
| 2024 | Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples. Ziqi Zhou, Minghui Li, Wei Liu, Shengshan Hu, Yechao Zhang, Wei Wan, Lulu Xue, Leo Yu Zhang, Dezhong Yao, Hai Jin |
| 2024 | Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification. Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan |
| 2024 | Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study. Mindy Tran, Collins W. Munyendo, Harshini Sri Ramulu, Rachel Gonzalez Rodriguez, Luisa Ball Schnell, Cora Sula, Lucy Simko, Yasemin Acar |
| 2024 | Serberus: Protecting Cryptographic Code from Spectres at Compile-Time. Nicholas Mosier, Hamed Nemati, John C. Mitchell, Caroline Trippel |
| 2024 | Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities. Julia Wunder, Andreas Kurtz, Christian Eichenmüller, Freya Gassmann, Zinaida Benenson |
| 2024 | Side-Channel-Assisted Reverse-Engineering of Encrypted DNN Hardware Accelerator IP and Attack Surface Exploration. Cheng Gongye, Yukui Luo, Xiaolin Xu, Yunsi Fei |
| 2024 | Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors. Taylor R. Schorlemmer, Kelechi G. Kalu, Luke Chigges, Kyung Myung Ko, Eman Abu Ishgair, Saurabh Bagchi, Santiago Torres-Arias, James C. Davis |
| 2024 | SmartInv: Multimodal Learning for Smart Contract Invariant Inference. Sally Junsong Wang, Kexin Pei, Junfeng Yang |
| 2024 | SneakyPrompt: Jailbreaking Text-to-image Generative Models. Yuchen Yang, Bo Hui, Haolin Yuan, Neil Gong, Yinzhi Cao |
| 2024 | SoK: A Comprehensive Analysis and Evaluation of Docker Container Attack and Defense Mechanisms. Md. Sadun Haq, Thien Duc Nguyen, Ali Saman Tosun, Franziska Vollmer, Turgay Korkmaz, Ahmad-Reza Sadeghi |
| 2024 | SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model. Jelle Vos, Mauro Conti, Zekeriya Erkin |
| 2024 | SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields. Jean Paul Degabriele, Jan Gilcher, Jérôme Govinden, Kenneth G. Paterson |
| 2024 | SoK: Explainable Machine Learning in Adversarial Environments. Maximilian Noppel, Christian Wressnegger |
| 2024 | SoK: Privacy-Preserving Data Synthesis. Yuzheng Hu, Fan Wu, Qinbin Li, Yunhui Long, Gonzalo Munilla Garrido, Chang Ge, Bolin Ding, David A. Forsyth, Bo Li, Dawn Song |
| 2024 | SoK: Prudent Evaluation Practices for Fuzzing. Moritz Schloegel, Nils Bars, Nico Schiller, Lukas Bernhard, Tobias Scharnowski, Addison Crump, Arash Ale Ebrahim, Nicolai Bissantz, Marius Muench, Thorsten Holz |
| 2024 | SoK: SGX.Fail: How Stuff Gets eXposed. Stephan van Schaik, Alexander Seto, Thomas Yurek, Adam Batori, Bader AlBassam, Daniel Genkin, Andrew Miller, Eyal Ronen, Yuval Yarom, Christina Garman |
| 2024 | SoK: Safer Digital-Safety Research Involving At-Risk Users. Rosanna Bellini, Emily Tseng, Noel Warford, Alaa Daffalla, Tara Matthews, Sunny Consolvo, Jill Palzkill Woelfer, Patrick Gage Kelley, Michelle L. Mazurek, Dana Cuomo, Nicola Dell, Thomas Ristenpart |
| 2024 | SoK: Security and Privacy of Blockchain Interoperability. André Augusto, Rafael Belchior, Miguel Correia, André Vasconcelos, Luyao Zhang, Thomas Hardjono |
| 2024 | SoK: Technical Implementation and Human Impact of Internet Privacy Regulations. Eleanor Birrell, Jay Rodolitz, Angel Ding, Jenna Lee, Emily McReynolds, Jevan A. Hutson, Ada Lerner |
| 2024 | SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth. Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Jing Tian, Antonio Bianchi |
| 2024 | SoK: Unintended Interactions among Machine Learning Defenses and Risks. Vasisht Duddu, Sebastian Szyller, N. Asokan |
| 2024 | Sophon: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models. Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Liangming Xia, Yijie Bai, Haiqin Weng, Wenyuan Xu |
| 2024 | Specious Sites: Tracking the Spread and Sway of Spurious News Stories at Scale. Hans W. A. Hanley, Deepak Kumar, Zakir Durumeric |
| 2024 | Specular: Towards Secure, Trust-minimized Optimistic Blockchain Execution. Zhe Ye, Ujval Misra, Jiajun Cheng, Wenyang Zhou, Dawn Song |
| 2024 | Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Length. Jianning Zhang, Ming Su, Xiaoguang Liu, Gang Wang |
| 2024 | SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations. Borui Yang, Wei Li, Liyao Xiang, Bo Li |
| 2024 | Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags. Floris Gorter, Taddeus Kroes, Herbert Bos, Cristiano Giuffrida |
| 2024 | Surveilling the Masses with Wi-Fi-Based Positioning Systems. Erik C. Rye, Dave Levin |
| 2024 | Sweep-UC: Swapping Coins Privately. Lucjan Hanzlik, Julian Loss, Sri Aravinda Krishnan Thyagarajan, Benedikt Wagner |
| 2024 | SwiftRange: A Short and Efficient Zero-Knowledge Range Argument For Confidential Transactions and More. Nan Wang, Sid Chi-Kin Chau, Dongxi Liu |
| 2024 | Synq: Public Policy Analytics Over Encrypted Data. Zachary Espiritu, Marilyn George, Seny Kamara, Lucy Qin |
| 2024 | SyzGen++: Dependency Inference for Augmenting Kernel Driver Fuzzing. Weiteng Chen, Yu Hao, Zheng Zhang, Xiaochen Zou, Dhilung Kirat, Shachee Mishra, Douglas Lee Schales, Jiyong Jang, Zhiyun Qian |
| 2024 | SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices. Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah |
| 2024 | TCP Spoofing: Reliable Payload Transmission Past the Spoofed TCP Handshake. Yepeng Pan, Christian Rossow |
| 2024 | Tabbed Out: Subverting the Android Custom Tab Security Model. Philipp Beer, Marco Squarcina, Lorenzo Veronese, Martina Lindorfer |
| 2024 | Targeted and Troublesome: Tracking and Advertising on Children's Websites. Zahra Moti, Asuman Senol, Hamid Bostani, Frederik J. Zuiderveen Borgesius, Veelasha Moonsamy, Arunesh Mathur, Gunes Acar |
| 2024 | Test-Time Poisoning Attacks Against Test-Time Adaptation Models. Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang |
| 2024 | Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks. Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren |
| 2024 | The Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellations. Wei Liu, Yuanjie Li, Hewu Li, Yimei Chen, Yufeng Wang, Jingyi Lan, Jianping Wu, Qian Wu, Jun Liu, Zeqi Lai |
| 2024 | The Great Request Robbery: An Empirical Study of Client-side Request Hijacking Vulnerabilities on the Web. Soheil Khodayari, Thomas Barber, Giancarlo Pellegrino |
| 2024 | The Inventory is Dark and Full of Misinformation: Understanding Ad Inventory Pooling in the Ad-Tech Supply Chain. Yash Vekaria, Rishab Nithyanand, Zubair Shafiq |
| 2024 | The Role of User-Agent Interactions on Mobile Money Practices in Kenya and Tanzania. Karen Sowon, Edith Luhanga, Lorrie Faith Cranor, Giulia Fanti, Conrad Tucker, Assane Gueye |
| 2024 | The Times They Are A-Changin': Characterizing Post-Publication Changes to Online News. Chris Tsoukaladelis, Brian Kondracki, Niranjan Balasubramanian, Nick Nikiforakis |
| 2024 | Threshold ECDSA in Three Rounds. Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat |
| 2024 | Thwarting Last-Minute Voter Coercion. Rosario Giustolisi, Maryam Sheikhi Garjan, Carsten Schürmann |
| 2024 | Time-Aware Projections: Truly Node-Private Graph Statistics under Continual Observation. Palak Jain, Adam Smith, Connor Wagaman |
| 2024 | Titan : Efficient Multi-target Directed Greybox Fuzzing. Heqing Huang, Peisen Yao, Hung-Chun Chiu, Yiyuan Guo, Charles Zhang |
| 2024 | To Auth or Not To Auth? A Comparative Analysis of the Pre- and Post-Login Security Landscape. Jannis Rautenstrauch, Metodi Mitkov, Thomas Helbrecht, Lorenz Hetterich, Ben Stock |
| 2024 | To Boldly Go Where No Fuzzer Has Gone Before: Finding Bugs in Linux' Wireless Stacks through VirtIO Devices. Sönke Huster, Matthias Hollick, Jiska Classen |
| 2024 | Towards Smart Contract Fuzzing on GPUs. Weimin Chen, Xiapu Luo, Haipeng Cai, Haoyu Wang |
| 2024 | Transferable Multimodal Attack on Vision-Language Pre-training Models. Haodi Wang, Kai Dong, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang, Xianglong Liu |
| 2024 | TrojanPuzzle: Covertly Poisoning Code-Suggestion Models. Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim |
| 2024 | TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets. Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li |
| 2024 | UnTrustZone: Systematic Accelerated Aging to Expose On-chip Secrets. Jubayer Mahmod, Matthew Hicks |
| 2024 | Undefined-oriented Programming: Detecting and Chaining Prototype Pollution Gadgets in Node.js Template Engines for Malicious Consequences. Zhengyu Liu, Kecheng An, Yinzhi Cao |
| 2024 | Understanding Parents' Perceptions and Practices Toward Children's Security and Privacy in Virtual Reality. Jiaxun Cao, Abhinaya S. B., Anupam Das, Pardis Emami Naeini |
| 2024 | Understanding and Benchmarking the Commonality of Adversarial Examples. Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu |
| 2024 | Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics. Jiacen Xu, Xiaokui Shu, Zhou Li |
| 2024 | Understanding the Privacy Practices of Political Campaigns: A Perspective from the 2020 US Election Websites. Kaushal Kafle, Prianka Mandal, Kapil Singh, Benjamin Andow, Adwait Nadkarni |
| 2024 | Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data. Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso |
| 2024 | Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device's Power LED Captured by Standard Video Cameras. Ben Nassi, Etay Iluz, Or Hai Cohen, Ofek Vayner, Dudi Nassi, Boris Zadov, Yuval Elovici |
| 2024 | WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP. Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, Shweta Shinde |
| 2024 | Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables. Doguhan Yeke, Muhammad Ibrahim, Güliz Seray Tuncay, Habiba Farrukh, Abdullah Imran, Antonio Bianchi, Z. Berkay Celik |
| 2024 | Where Are the Red Lines? Towards Ethical Server-Side Scans in Security and Privacy Research. Florian Hantke, Sebastian Roth, Rafael Mrowczynski, Christine Utz, Ben Stock |
| 2024 | Where URLs Become Weapons: Automated Discovery of SSRF Vulnerabilities in Web Applications. Enze Wang, Jianjun Chen, Wei Xie, Chuhan Wang, Yifei Gao, Zhenhua Wang, Haixin Duan, Yang Liu, Baosheng Wang |
| 2024 | Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network. Takayuki Sasaki, Takaya Noma, Yudai Morii, Toshiya Shimura, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto |
| 2024 | Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability. Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin |
| 2024 | Withdrawing is believing? Detecting Inconsistencies between Withdrawal Choices and Third-party Data Collections in Mobile Apps. Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang |
| 2024 | You Only Prompt Once: On the Capabilities of Prompt Learning on Large Language Models to Tackle Toxic Content. Xinlei He, Savvas Zannettou, Yun Shen, Yang Zhang |
| 2024 | eAudit: A Fast, Scalable and Deployable Audit Data Collection System. R. Sekar, Hanke Kimm, Rohit Aich |
| 2024 | hinTS: Threshold Signatures with Silent Setup. Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang |